Show simple item record

dc.contributor.authorStaab, S.
dc.contributor.authorBhargava, B.
dc.contributor.authorLeszek, L.
dc.contributor.authorRosenthal, A.
dc.contributor.authorWinslett, M.
dc.contributor.authorSloman, M.
dc.contributor.authorDillon, Tharam S.
dc.contributor.authorChang, Elizabeth
dc.contributor.authorHussain, Farookh
dc.contributor.authorNejdl, W.
dc.contributor.authorOlmedilla, D.
dc.contributor.authorKashyap, V.
dc.date.accessioned2017-01-30T13:54:00Z
dc.date.available2017-01-30T13:54:00Z
dc.date.created2008-11-12T23:32:45Z
dc.date.issued2004
dc.identifier.citationStaab, Steffen and Bhargava, Bharat and Lilien, Leszek and Rosenthal, Arnon and Winslett, Marianne and Sloman, Morris and Dillon, Tharam and Chang, Elizabeth and Hussain, Farookh and Nejdl, Wolfgang and Olmedilla, Daniel and Kashyap, Vipul. 2004. The Pudding of Trust. IEEE Intelligent Systems 19 (5): 74-88.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/36145
dc.description.abstract

Trust - "reliance on the integrity, ability, or character of a person or thing" - is pervasive in social systems. We constantly apply it in interactions between people, organizations, animals, and even artifacts. We use it instinctively and implicitly in closed and static systems, or consciously and explicitly in open or dynamic systems. An epitome for the former case is a small village, where everybody knows everybody, and the villagers instinctively use their knowledge or stereotypes to trust or distrust their neighbors. A big city exemplifies the latter case, where people use explicit rules of behavior in diverse trust relationships. We already use trust in computing systems extensively, although usually subconsciously. The challenge for exploiting trust in computing lies in extending the use of trust-based solutions, first to artificial entities such as software agents or subsystems, then to human users' subconscious choices.

dc.publisherIEEE
dc.titleThe Pudding of Trust
dc.typeJournal Article
dcterms.source.volume19
dcterms.source.number5
dcterms.source.startPage74
dcterms.source.endPage88
dcterms.source.titleIEEE Intelligent Systems
curtin.note

Copyright 2004 IEEE

curtin.note

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

curtin.departmentCentre for Extended Enterprises and Business Intelligence
curtin.identifierEPR-2427
curtin.accessStatusOpen access


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record